Negar Ahkami the Consumption

Total Page:16

File Type:pdf, Size:1020Kb

Negar Ahkami the Consumption Negar Ahkami THE CONSUMPTION Leila Heller announced the opening of The Consumption, Negar Ahkami’s second solo exhibition at her gal- lery in New York City. The exhibition ran from June 6 – July 6, 2013. The Consumption features a selection of new works by Ahkami, including exuberant paintings with bas-relief surfaces that depict a variety of figures in water. A fully illustrated catalogue, with an essay by art historian Jane Panetta, accompanies the exhibition. Ahkami’s water imagery is calligraphic and patterned, inspired by Iran’s blue-tiled mosques, which have been said to symbolize water and nature. The artist uses all-over patterning and water symbolism expressionisti- cally, to convey a psychic loss of control. Families under water struggle to keep children afloat. Women sink on opulent loveseats, clinging to their possessions. Female figures submerged in patterned waves appear to be in ecstasy, willingly surrendering control. In these intense yet playful works, water acts as a symbol of struggle and passion. Emerging in Ahkami’s work is a new vocabulary of universal iconography exploring the human condition in today’s world. Her current works dialogue with monumental compositions of ancient Near Eastern rock reliefs. While in the past decade, Ahkami routinely created overtly political imagery, in 3 paintings in this exhibit, she revisits her iconography of melting Persianate cityscapes spreading cartoonishly towards the viewer. For Ah- kami, this caricature of Iran’s regime, and of fears of its nuclear threat, is a product of consumption “of media images that have distorted the view of Iran from a distance”. Her recent returns to this theme are spectacles of pattern that shift between entrancing and cartoonish, with more fascination than angst. Persian art influences continue to predominate in Ahkami’s new work. Her paintings’ relief-like textures, and glazes of deep blues and pearlescent whites, borrow from Iran’s lusterware and molded-relief ceramics. For Ahkami, the dynamic textures of these sources, and the obsessive, hand-made quality of the patterning, “carry the potential for a Persian-Islamic art that can be as emotive and personal as the exaggerated gestures and drips of Western expressionism.” Ahkami similarly exploits the expressive potential of complex pattern juxta- positions in Iranian art and architecture. Her depictions of figures in a cacophony of rhythmic pattern evoke their powerlessness against greater forces. Other influences apparent in her work include 1970s mattresses, majolica pottery, blue and white ceramics, as well as Matisse, Klimt and Pollock. Ahkami’s attraction to these sources emerged, in part, from her belief in their connections to Persian-Islamic aesthetics. Her paintings celebrate Persian art’s connectivity and its contributions to global visual culture. However rooted in her dialogues and influences, Ahkami’s art is distinctly her own, and represents her continued quest for a global art that honors Persian-Islamic art as well as Western traditions of individualism and free expression. About Negar Ahkami Born in Baltimore, Maryland in 1971, and raised in northern New Jersey, Ahkami lives and works in Brooklyn, New York. Ahkami received a BA in Middle Eastern Languages and Cultures from Columbia University, a JD from Georgetown University Law Center, and an MFA from the School of Visual Arts. Ahkami is currently participating in Lower Manhattan Cultural Council’s Swing Space residency on Governor’s Island. Other residencies include LMCC’s Workspace Resi- dency and Skowhegan School of Painting and Sculpture. Her work has been included in group exhibitions in national and international venues, including Princeton University’s Bernstein Gallery, the Chelsea Art Museum, the Austrian Cultural Forum, the Longwood Art Gallery, and Stefan Stux Gallery. Ahkami’s work is represented in numerous public and private art collections, including The New Britain Museum of American Art (New Britain, CT), Depaul University Art Museum (Chicago, IL), and Farjam Collection (Dubai, UAE). Pictures on the inside covers are courtesy of the artist Negar Ahkami and the Leila Heller Gallery, New York A TRUE DIAMOND SOURCE Think you have to travel to the “Big City” to find diamond experts? Think you’re getting a high-level of expertise from that clerk at the Mall? Think you have to “know someone” to get a great deal? Think again! The experts at Bentley Diamonds will show you that the expertise you can get only from people who truly love and appreciate fine diamonds is right in Wall Township. Technology has made the knowledge of the Four Cs – Color, Clarity, Cut and Carat Weight – just the beginning of diamond evaluating. With technology has come new coatings, irradia- tion, heat treatments, color enhancements and High Pressure High Temperature Treatment, to name a few. These new techniques can make a diamond look great, but may not increase its value and some of them are only temporary. Kaz Bagheri and Dan Capuano, co-owners of Bentley Diamonds make sure you know exactly what you are buying and will take the time to educate each and every customer. Primarily diamond merchants, Bagheri and Capuano added the jewelry store to the already thriving diamond business when they realized that some friends and customers were paying inflated prices and being given misinformation elsewhere. As diamond-dealers they saw customers being sold overpriced and under-appreciated diamonds. Now they make sure that every piece sold at Bent- ley Diamonds is exactly the right size, design and cost for the customer. As diamond manufacturers and importers, they can cut out the middlemen and the steps that inflate diamond prices. With over 3,000 setting available and the experts to make any custom setting combined with their buying power to get the highest-quality stones for less, Capuano and Bagheri will make sure your purchase will fit the occasion, your personality and your budget. More Precious Than Our Diamonds is Our- Reputation. BENTLEY DIAMOND 1860 Highway 35, Wall, NJ (800) 333-DIAMONDS www.bentleydiamond.com Family Chiropractic & Spinal Health Care Center Dr. M. Abtahi, DC Chiropractic Physician Just by being here, you know you’ve made the right choice. A healthy, pain-free life can be yours! LET CHIROPRACTIC HELP YOU WITH THESE CONDITIONS: Chiropractic and spinal care is a safe, effective alternative to surgery and drug treat- ments for many common conditions including headaches, neck pain, sciatica, arm pain, back pain, injuries and much more. This approach to wellness assists the bones, joints, nervous and muscular system work for efficiently to optimize function... دردهای ناشی از بارداری, درد مفاصل, درد كمر, ستون فقرات و ... تنها با یک تلفن از انواع دردها خﻻص شوید!!! CALL US AT: (201) 995-9900 to schedule your appointment today at one of our convenient locations: LOCATION 1: 27 S. Franklin Tpk., Ramsey, NJ 07446 LOCATION 2: 110 Passaic Ave., Passaic, NJ 07055 Persian Heri tage Persian Heritage Vol. 18, No. 70 Summer 2013 www.persian-heritage.com FROM THE EDITOR’S DESK 6 Persian Heritage, Inc. 110 Passaic Avenue LETTERS TO Editor 8 Passaic, NJ 07055 Iranian Firefighter Saves Lives 8 E-mail: [email protected] Telephone: (973) 471-4283 NEWs Fax: 973 471 8534 Three Iranian-American Women in Tech 9 Susan Amini, the Newly Appointed Judge 9 EDITOR The First Successful Hand Transplant in Iran 10 SHAHROKH AHKAMI COMMENTARY EDITORIAL BOARD Iranian-Americans (Maboud Ansari) 12 Dr. Mehdi Abusaidi, Shirin Ahkami Raiszadeh, Dr. Mahvash Alavi Naini, No Traces of Old Tree (poem) (Firouz Hejazi) 14 Mohammad Bagher Alavi, Dr. Talat Bassari, Mohammad H. Hakami, The Cyrus Cylinder, the Symbol 15 Ardeshir Lotfalian, K. B. Navi, Dr. Kamshad Raiszadeh, Farhang A. of Great Leadership and Human Rights Sadeghpour, Mohammad K. Sadigh, Dr. David Yeagley. Olympics and Iran-US Relations 15 Theft of Persian Artistic and Cultural Heritage 16 MANAGING EDITOR HALLEH NIA (Davood Rahni) ADVERTISING What is Iranish? 16 HALLEH NIA Mapping the Iranian Genome 17 * The contents of the articles and ad ver- 2013 National Survey of Iranian-Americans 17 tisements in this journal, with the ex ception of the edi torial, are the sole works of each THE ARTS & Culture in di vidual writers and contributors. This maga- zine does not have any confirmed knowledge REVIEWS 18 as to the truth and ve racity of these articles. Irandokht: Daughters of Iran 19 all contributors agree to hold harmless and indemnify Persian Heri tage (Mirass-e Iran), The Art of Kevin Hosseini 20 Persian Heritage Inc., its editors, staff, board of directors, and all those indi viduals directly Interview with Professor Fazlollah Reza 21 associated with the pub lishing of this maga- zine. The opinions ex pressed in these articles (Shahrokh Ahkami) are the sole opinions of the writers and not the journal. No article or pic ture submitted will be The Promise of Almaty (Omid Irani) 24 returned to the writer or contributor. All articles The City of Polish Children 26 submitted in English must be typed. * The appearance of advertising in this maga- A Monologue (Alexander Tamraz) 28 zine does not constitute a guar an tee or en- dorsement of the products by Persian Heri tage. Abu Ali Sina (Avecenna) 29 In addition, articles and letters published do not reflect the views of this publication. My Journey in Life (poem) (Bahar Bastani) 29 * Letters to the Editor should be mailed, faxed or e-mailed to the above addresses and num bers. Interview with Dr. Fereydoun Ala 30 The journal reserves the right to edit same for (Shahrokh Ahkami) space and clarity or as deemed appro priate. * All requests for permissions and reprints must be made in writing to the managing editor. PUBLISHED BY PERSIAN HERITAGE, INC. IMPORTANT NOTICE A corporation organized for cultural and All written sub missions to Persian Heri tage with the ex pec tation of lit erary purposes publication in the magazine must include the writer’s name, address Cover Price: $6.00 Subscriptions: $24.00/year (domestic); and telephone number.
Recommended publications
  • Cyber Defense Emagazine – June 2018 Edition Copyright © Cyber Defense Magazine, All Rights Reserved Worldwide
    …130+ Packed Pages This Month… CyberDefenseTV.com continues to grow with more interviews of C level executives in the Cyber HotSeat… BlackHat Trip Report and Great C Level InfoSec Thought Leader interviews… Transforming Cyber Security An End to the Era of Passwords? The Impact of SOAR on Incident Response Steps The Art of Phishing and How To Fight It …and much more… 1 Cyber Defense eMagazine – June 2018 Edition Copyright © Cyber Defense Magazine, All rights reserved worldwide CONTENTS BlackHat Conference 2018 Trip Report........................................................................................ 15 Transforming Cyber Security........................................................................................................ 35 Cyber Security Tips for Business Travelers................................................................................... 38 Building blocks to manage the supply chain ............................................................................... 40 Cyber PSYOP: The New Way to Impact Opinons and Politics ..................................................... 42 Let Passwords Go Extinct ............................................................................................................. 45 The Impact of SOAR on Incident Response Steps ........................................................................ 47 2018 is Late but Still the Right Time to Bid Goodbye to Malware Prone SMBv1 ...................... 50 Best Practices for DDoS Mitigation in the Terabit Attack Era ...................................................
    [Show full text]
  • Success Strategies in Emerging Iranian American Women Leaders
    Pepperdine University Pepperdine Digital Commons Theses and Dissertations 2017 Success strategies in emerging Iranian American women leaders Sanam Minoo Follow this and additional works at: https://digitalcommons.pepperdine.edu/etd Recommended Citation Minoo, Sanam, "Success strategies in emerging Iranian American women leaders" (2017). Theses and Dissertations. 856. https://digitalcommons.pepperdine.edu/etd/856 This Dissertation is brought to you for free and open access by Pepperdine Digital Commons. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Pepperdine Digital Commons. For more information, please contact [email protected], [email protected], [email protected]. Pepperdine University Graduate School of Education and Psychology SUCCESS STRATEGIES IN EMERGING IRANIAN AMERICAN WOMEN LEADERS A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Education in Organizational Leadership by Sanam Minoo July, 2017 Farzin Madjidi, Ed.D. – Dissertation Chairperson This dissertation, written by Sanam Minoo under the guidance of a Faculty Committee and approved by its members, has been submitted to and accepted by the Graduate Faculty in partial fulfillment of the requirements for the degree of DOCTOR OF EDUCATION Doctoral Committee: Farzin Madjidi, Ed.D., Chairperson Lani Simpao Fraizer, Ed.D. Gabriella Miramontes, Ed.D. © Copyright by Sanam Minoo 2017 All Rights Reserved TABLE OF CONTENTS Page LIST OF TABLES ........................................................................................................................
    [Show full text]
  • Understanding Flaws in the Deployment and Implementation of Web Encryption
    Understanding Flaws in the Deployment and Implementation of Web Encryption Suphannee Sivakorn Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2018 © 2018 Suphannee Sivakorn All rights reserved ABSTRACT Understanding Flaws in the Deployment and Implementation of Web Encryption Suphannee Sivakorn In recent years, the web has switched from using the unencrypted HTTP protocol to using encrypted communications. Primarily, this resulted in increasing deployment of TLS to mitigate information leakage over the network. This development has led many web service operators to mistakenly think that migrating from HTTP to HTTPS will magically protect them from information leakage without any additional effort on their end to guar- antee the desired security properties. In reality, despite the fact that there exists enough infrastructure in place and the protocols have been “tested” (by virtue of being in wide, but not ubiquitous, use for many years), deploying HTTPS is a highly challenging task due to the technical complexity of its underlying protocols (i.e., HTTP, TLS) as well as the complexity of the TLS certificate ecosystem and this of popular client applications suchas web browsers. For example, we found that many websites still avoid ubiquitous encryption and force only critical functionality and sensitive data access over encrypted connections while allowing more innocuous functionality to be accessed over HTTP. In practice, this approach is prone to flaws that can expose sensitive information or functionality tothird parties. Thus, it is crucial for developers to verify the correctness of their deployments and implementations.
    [Show full text]
  • Building Secure and Reliable Systems
    Building Secure & Reliable Systems Best Practices for Designing, Implementing and Maintaining Systems Compliments of Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea & Adam Stubblefi eld Praise for Building Secure and Reliable Systems It is very hard to get practical advice on how to build and operate trustworthy infrastructure at the scale of billions of users. This book is the first to really capture the knowledge of some of the best security and reliability teams in the world, and while very few companies will need to operate at Google’s scale many engineers and operators can benefit from some of the hard-earned lessons on securing wide-flung distributed systems. This book is full of useful insights from cover to cover, and each example and anecdote is heavy with authenticity and the wisdom that comes from experimenting, failing and measuring real outcomes at scale. It is a must for anybody looking to build their systems the correct way from day one. —Alex Stamos, Director of the Stanford Internet Observatory and former CISO of Facebook and Yahoo This book is a rare treat for industry veterans and novices alike: instead of teaching information security as a discipline of its own, the authors offer hard-wrought and richly illustrated advice for building software and operations that actually stood the test of time. In doing so, they make a compelling case for reliability, usability, and security going hand-in-hand as the entirely inseparable underpinnings of good system design. —Michał Zalewski, VP of Security Engineering at Snap, Inc. and author of The Tangled Web and Silence on the Wire This is the “real world” that researchers talk about in their papers.
    [Show full text]
  • Improving Security and Performance in Low Latency Anonymous Networks
    Improving Security and Performance in Low Latency Anonymous Networks by Kevin Scott Bauer B.S., University of Denver, 2005 A thesis submitted to the Faculty of the Graduate School of the University of Colorado in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Computer Science 2011 This thesis entitled: Improving Security and Performance in Low Latency Anonymous Networks written by Kevin Scott Bauer has been approved for the Department of Computer Science Prof. Dirk Grunwald Prof. Douglas Sicker Prof. Shivakant Mishra Prof. Nikita Borisov Prof. Stefan Savage Date The final copy of this thesis has been examined by the signatories, and we find that both the content and the form meet acceptable presentation standards of scholarly work in the above mentioned discipline. Bauer, Kevin Scott (Ph.D., Computer Science) Improving Security and Performance in Low Latency Anonymous Networks Thesis directed by Co-Chairs Prof. Dirk Grunwald and Prof. Douglas Sicker Conventional wisdom dictates that the level of anonymity offered by low latency anonymity networks increases as the user base grows. However, the most significant obstacle to increased adoption of such systems is that their security and performance properties are perceived to be weak. In an effort to help foster adoption, this dissertation aims to better understand and improve security, anonymity, and performance in low latency anonymous communication systems. To better understand the security and performance properties of a popular low latency anonymity network, we characterize Tor, focusing on its application protocol distribution, geopo- litical client and router distributions, and performance. For instance, we observe that peer-to-peer file sharing protocols use an unfair portion of the network’s scarce bandwidth.
    [Show full text]
  • An Experience Sampling Study of User Reactions to Browser Warnings in the Field
    An Experience Sampling Study of User Reactions to Browser Warnings in the Field Robert W. Reeder1, Adrienne Porter Felt1, Sunny Consolvo1, Nathan Malkin2, Christopher Thompson2, and Serge Egelman2;3 1Google, Mountain View, CA 2University of California, Berkeley, CA 3International Computer Science Institute, Berkeley, CA {rreeder,felt,sconsolvo}@google.com, {nmalkin,cthompson,egelman}@cs.berkeley.edu ABSTRACT Due to their importance, browser warnings have received a Web browser warnings should help protect people from mal- great deal of attention. Initially, browser warnings gained ware, phishing, and network attacks. Adhering to warnings a reputation for low adherence rates [17, 19, 37, 40, 41]. keeps people safer online. Recent improvements in warning Vendors responded to this research with improvements. In design have raised adherence rates, but they could still be 2013, the Chrome and Firefox teams released data showing higher. And prior work suggests many people still do not that contemporary warnings had relatively high adherence understand them. Thus, two challenges remain: increasing rates—except for the Chrome HTTPS error warning, which both comprehension and adherence rates. To dig deeper into still suffered from low adherence (only 30% of users adhered user decision making and comprehension of warnings, we to the warnings) [2]. After further work, Chrome’s HTTPS performed an experience sampling study of web browser secu- error warning caught up, and now up to 70% of users adhere rity warnings, which involved surveying over 6,000 Chrome to the warnings [21, 22, 44]. Despite these improvements, and Firefox users in situ to gather reasons for adhering or not HTTPS warning adherence rates can still be improved.
    [Show full text]
  • (2010-2013). He Is a Creator of the Spread Toolkit ( the First Scalable Group Communication System with Strong Semantics
    Forum on Cyber Resilience Member Biographies as of 2019-04 Fred B. Schneider (NAE), is Samuel B. Eckert Professor of Computer Science at Cornell University. He joined Cornell's faculty in Fall 1978, having completed a Ph.D. at Stony Brook University and a B.S. in engineering at Cornell in 1975. Schneider's research has always concerned various aspects of trustworthy systems —systems that will perform as expected, despite failures and attacks. Most recently, his interests have focused on system security. His work characterizing what policies can be enforced with various classes of defenses is widely cited, and it is seen as advancing the nascent science base for security. He is also engaged in research concerning legal and economic measures for improving system trustworthiness. Schneider was elected a fellow of the American Association for the Advancement of Science (1992), the Association of Computing Machinery (1995), and the Institute of Electrical and Electronics Engineers (2008). He was named Professor-at-Large at the University of Tromso (Norway) in 1996 and was awarded a Doctor of Science honoris causa by the University of Newcastle-upon-Tyne in 2003 for his work in computer dependability and security. He received the 2012 IEEE Emanuel R. Piore Award for "contributions to trustworthy computing through novel approaches to security, fault-tolerance and formal methods for concurrent and distributed systems". The U.S. National Academy of Engineering elected Schneider to membership in 2011, the Norges Tekniske Vitenskapsakademi (Norwegian Academy of Technological Sciences) named him a foreign member in 2010, and the American Academy of Arts and Sciences elected him in 2017.
    [Show full text]
  • Women Know Cyber
    WOMEN KNOW CYBER 100 Fascinating Females Fighting Cybercrime STEVE MORGAN & DI FREEZE WOMEN KNOW CYBER: 100 Fascinating Females Fighting Cybercrime Copyright © 2019 by Cybersecurity Ventures ISBN 978-1-7330157-0-7 All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. For permission requests, write to the publisher, addressed “Attention: Permissions Coordinator,” at the address below. Cybersecurity Ventures 83 Main Street, 2nd Floor, Suite 5 Northport, N.Y. 11768 This book is dedicated to my six children. Without you, my first book would have been completed thirty years ago. I thank God for showing me what’s most important in life. – Steve Morgan Cybersecurity Conference Sponsor FutureCon produces cutting-edge events aimed at CISOs, IT security professionals, and cybersecurity companies – bringing together the best minds in the industry for a unique experi- ence. These one-day events in more than 20 cities throughout North America feature thought- provoking presentations by industry leaders, esteemed keynote speakers, and a panel session with cybersecurity experts. Each FutureCon event provides attendees with the very latest and highest level vendor-neutral training in the security community. FutureCon's founder, Kim Hakim, is a U.S. Navy veteran with more than two decades of experience producing thousands of cybersecurity conferences. "Women Know Cyber" book signings and special programs will be held at FutureCon events.
    [Show full text]
  • Enhancing Cybersecurity: the Role of Innovation Ecosystems
    SEMINAR SUMMARY APRIL 2019 ENHANCING CYBERSECURITY: THE ROLE OF INNOVATION ECOSYSTEMS EXECUTIVE SUMMARY This document summarizes the conversations from the seminar “Enhancing Cybersecurity – The Role of Innovation Ecosystems” that took place on February 13th 2019 at the Massachusetts Institute of Technology in Cambridge, Massachusetts. The goal of the Seminar was to advance participants’ knowledge of innovation ecosystems for innovation in cybersecurity. Its approach was to emphasize the growing agglomeration of innovation-driven enterprises creating innovative solutions, and the tightly-coupled inter- dependencies in these hubs of entrepreneurs, governments, risk-capital, universities and large corporations. The Seminar was organized by the MIT Innovation Initiative (MITii), the Federmann Cyber Security Center at the Hebrew University of Jerusalem (HCSRC), Israel’s National Cyber Directorate (INCD), the UK Department for Digital, Culture, Media & Sport (DCMS), and the UK Science & Innovation Network. Forty participants representing all of the ecosystem stakeholders (governments, universities, corporations, entrepreneurs, and risk capital) were invited to participate (see Appendix B). The Main Insights: • Cybersecurity is an area of technological, corporate and regulatory innovation that emphasizes the growing agglomeration of innovation-driven enterprises and inter- dependencies between entrepreneurs, governments, risk-capital, universities and large corporations. Innovation ecosystems thus provide an important lens to understand the specific case of innovation in cybersecurity, and to enhance our understanding of innovation ecosystems in general. • This insight is key for practitioners and promoters of innovation in cybersecurity, as the lessons from wider ‘innovation ecosystems’ become more and more relevant to their efforts. As such, the multi-stakeholder ecosystem approach (broadly defined) can help enhance and accelerate innovation in cybersecurity, as it has elsewhere.
    [Show full text]
  • Winter 2017 Vol
    ;login WINTER 2017 VOL. 42, NO. 4 : & Neural Nets Improve Password Choices William Melicher, Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor & DNSSEC: Useless as Used Taejoong Chung, Roland van Rijswijk-Deij, Balakrishnan Chandrasekaran, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, and Christo Wilson & Fixing the Bitcoin Blockchain Shehar Bano, Mustafa Al-Bassam, and George Danezis & Psychological Safety in SRE Teams John P. Looney & Interview with Peter G. Neumann Columns Exiting Gracefully in Python David Beazley Perl without Perl David N. Blank-Edelman tcpdump as a Monitoring Tool Dave Josephsen Using Vault in Go Chris “Mac” McEniry Collecting Big Data Dan Geer UPCOMING EVENTS Enigma 2018 USENIX Security ’18: 27th USENIX Security January 16–18, 2018, Santa Clara, CA, USA Symposium www.usenix.org/enigma2018 August 15–17, 2018, Baltimore, MD, USA Submissions due February 8, 2018 FAST ’18: 16th USENIX Conference on File and Storage www.usenix.org/sec18 Technologies Co-located with USENIX Security ’18 February 12–15, 2018, Oakland, CA, USA SOUPS 2018: Fourteenth Symposium on Usable Privacy www.usenix.org/fast18 and Security August 12–14, 2018 SREcon18 Americas Abstract submissions due February 12, 2018 March 27–29, 2018, Santa Clara, CA, USA www.usenix.org/soups2018 www.usenix.org/srecon18americas WOOT ’18: 12th USENIX Workshop on Offensive NSDI ’18: 15th USENIX Symposium on Networked Technologies Systems Design and Implementation August 13–14, 2018 www.usenix.org/woot18 April 9–11, 2018, Renton,
    [Show full text]
  • The Computer Fraud and Abuse Act: Protecting the United States from Cyber-Attacks, Fake Dating Profiles, and Employees Who Check Facebook at Work, 5 U
    University of Miami Law School Institutional Repository University of Miami National Security & Armed Conflict Law Review 7-1-2015 The omputC er Fraud and Abuse Act: Protecting the United States from Cyber-Attacks, Fake Dating Profiles, and Employees Who Check Facebook at Work Kristin Westerhorstmann Follow this and additional works at: http://repository.law.miami.edu/umnsac Part of the Military, War and Peace Commons, and the National Security Commons Recommended Citation Kristin Westerhorstmann, The Computer Fraud and Abuse Act: Protecting the United States from Cyber-Attacks, Fake Dating Profiles, and Employees Who Check Facebook at Work, 5 U. Miami Nat’l Security & Armed Conflict L. Rev. 145 (2015) Available at: http://repository.law.miami.edu/umnsac/vol5/iss2/9 This Note is brought to you for free and open access by Institutional Repository. It has been accepted for inclusion in University of Miami National Security & Armed Conflict Law Review by an authorized administrator of Institutional Repository. For more information, please contact [email protected]. The Computer Fraud and Abuse Act: Protecting the United States from Cyber- Attacks, Fake Dating Profiles, and Employees Who Check Facebook at Work Kristin Westerhorstmann* ABSTRACT Each year, the frequency andseverityof cyber-attacks continue to increase. With each new threat comes more pressure on the government to implement an effectiveplanforpreventing these attacks. The first instinct has been to attempt either to enact more laws,orto broaden thescope of already-existing laws such as the Computer Fraud and Abuse Act (CFAA). The CFAA, the federal hacking statute, has been called the worst law in technology for itsexcessively broad scope and vague provisions, whichhaveresulted in arbitrary and discriminatory enforcement, conflicts with the federal private nondelegation doctrine, and in overcriminalization.
    [Show full text]
  • Measuring HTTPS Adoption on The
    Measuring HTTPS Adoption on the Web Adrienne Porter Felt, Google; Richard Barnes, Cisco; April King, Mozilla; Chris Palmer, Chris Bentzel, and Parisa Tabriz, Google https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/felt This paper is included in the Proceedings of the 26th USENIX Security Symposium August 16–18, 2017 • Vancouver, BC, Canada ISBN 978-1-931971-40-9 Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Measuring HTTPS Adoption on the Web Adrienne Porter Felt1, Richard Barnes2, April King3, Chris Palmer1, Chris Bentzel1, Parisa Tabriz1 1Google, 2Cisco, 3Mozilla 1felt, palmer, cbentzel, [email protected], [email protected], [email protected] Abstract [1, 24, 32, 3]). They plan to make further changes as HTTPS becomes the default standard [30, 3]. How HTTPS ensures that the Web has a base level of pri- close is the Web to considering HTTPS a default? vacy and integrity. Security engineers, researchers, and browser vendors have long worked to spread HTTPS to as much of the Web as possible via outreach efforts, de- In this paper, we measure HTTPS adoption rates from veloper tools, and browser changes. How much progress the perspectives of both clients and servers. A key chal- have we made toward this goal of widespread HTTPS lenge is that there are many ways to measure client us- adoption? We gather metrics to benchmark the status age and server support of HTTPS, each yielding differ- and progress of HTTPS adoption on the Web in 2017. ent findings on the prevalence of HTTPS. For example, To evaluate HTTPS adoption from a user perspective, HTTPS is a much higher fraction of browser page loads we collect large-scale, aggregate user metrics from two if the metrics count certain types of in-page navigations.
    [Show full text]